JPH04196683A - Facsimile equipment provided with cryptographic function - Google Patents

Facsimile equipment provided with cryptographic function

Info

Publication number
JPH04196683A
JPH04196683A JP2323559A JP32355990A JPH04196683A JP H04196683 A JPH04196683 A JP H04196683A JP 2323559 A JP2323559 A JP 2323559A JP 32355990 A JP32355990 A JP 32355990A JP H04196683 A JPH04196683 A JP H04196683A
Authority
JP
Japan
Prior art keywords
encryption key
data
check code
cryptographic key
key data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2323559A
Other languages
Japanese (ja)
Inventor
Hideaki Takahashi
英彰 高橋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Brother Industries Ltd
Original Assignee
Brother Industries Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Brother Industries Ltd filed Critical Brother Industries Ltd
Priority to JP2323559A priority Critical patent/JPH04196683A/en
Priority to US07/783,885 priority patent/US5202920A/en
Publication of JPH04196683A publication Critical patent/JPH04196683A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

PURPOSE:To attain correct cryptographic communication by adding an error check code to a cryptographic key data and sending the result to as to surely make a cryptographic key of a sender side and a receiver side match with each other. CONSTITUTION:A cryptographic key data inputted by a keyboard 2 is stored in a memory 1 by a CPU 8. When a cryptographic key transmission switch 9 is depressed, the CPU 8 extracts the cryptographic key data and sets it to a transmission buffer 6. In this case, simultaneously an error check code is set to the transmission buffer 6 and then the data is sequentially sent by a DTMF transmitter 4. Then a reception data is stored in a reception buffer 5 and the CPU 8 confirms the cryptographic key being the data in the reception buffer 5 and the error check code and when the data is correctly received, the cryptographic key is stored in a memory 1 and when in error, an error display LED 7 is lighted. Thus, erroneous setting of the cryptographic key is prevented and the cryptographic communication is correctly implemented.

Description

【発明の詳細な説明】 [産業上の利用分野] 本発明は、暗号通信を可能としたファクシミリ装置に関
する。
DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to a facsimile device that is capable of encrypted communication.

[従来の技術] 従来、暗号通信を行うためには、お互いに通信する相手
同士で口頭あるいは郵便等により一致した番号(暗号鍵
)を決定し、その暗号鍵を各々独自に入力した後暗号通
信を行っていた。しがしこの方法では、暗号鍵を誤って
入力してしまうと通信が不能になる。
[Prior Art] Conventionally, in order to perform encrypted communication, the parties to communicate with each other determine a matching number (encryption key) orally or by mail, etc., and each party independently inputs the encryption key before starting encrypted communication. was going on. However, with this method, if the encryption key is entered incorrectly, communication becomes impossible.

そこで、この暗号鍵を装置に入力し、入力した暗号鍵を
通信回線を介して相手に送信し、暗号鍵の受信時には自
動的に装置に設定する方法が考えられている。
Therefore, a method has been considered in which this encryption key is input into the device, the input encryption key is transmitted to the other party via a communication line, and the encryption key is automatically set in the device when the encryption key is received.

[発明が解決しようとする課題] しかしながら−1前述の暗号鍵を通信回線を介して自動
的に装置に設定する方法では、通信回線のノイズ等によ
り暗号鍵のデータが破壊され、誤った暗号鍵が設定され
ると暗号通信が不能となってしまう。
[Problems to be Solved by the Invention] However, -1. In the method described above in which the encryption key is automatically set in the device via the communication line, the data of the encryption key may be destroyed due to noise in the communication line, etc. If this is set, encrypted communication will become impossible.

本発明は、上述した課題を解決するためになされたもの
であり、送信側及び受信側の暗号鍵を確実に一致させる
ことにより、その暗号鍵によって行われる暗号通信を可
能とすることを目的としている。
The present invention has been made in order to solve the above-mentioned problems, and aims to enable encrypted communication using the encryption keys by reliably matching the encryption keys on the sending and receiving sides. There is.

[課題を解決するための手段′] この目的を達成するために、暗号化及び解読化のための
暗号鍵データを設定するための入力手段と、入力手段に
より設定された暗号鍵データを格納する記憶手段と、記
憶手段に格納されている暗号鍵データを通信信号に変換
して通信回線へ送出する送信信号変換手段と、前記記憶
手段に格納された暗号鍵によって送信画像を暗号化し送
信する暗号変換手段と、通信回線を介して受信した通信
信号を暗号鍵データに変換する受信信号変換手段と、受
信信号変換手段によって変換された暗号鍵データを前記
記憶手段に格納させる格納手段と、受信した暗号化信号
を前記記憶手段に格納された暗号鍵によって解読化して
画信号を得る暗号解読手段と、暗号鍵送信時に暗号鍵デ
ータにエラーチェックコードを付加して送出する付加手
段と、暗号鍵受信時に暗号鍵データを正しく受信したか
否かをエラーチェックコードを参照することにより判定
する判定手段と、その判定手段により誤りかあることを
判定した際に警告をおこなう警告手段を備えていること
を特徴としている。
[Means for solving the problem'] In order to achieve this purpose, an input means for setting encryption key data for encryption and decryption, and an encryption key data set by the input means are stored. a storage means, a transmission signal conversion means for converting encryption key data stored in the storage means into a communication signal and sending it to a communication line, and a cipher for encrypting and transmitting a transmission image using the encryption key stored in the storage means. a conversion means, a received signal conversion means for converting a communication signal received via a communication line into encryption key data, a storage means for storing the encryption key data converted by the reception signal conversion means in the storage means; a decoding means for decoding the encrypted signal using the cryptographic key stored in the storage means to obtain an image signal; an additional means for adding an error check code to the cryptographic key data and transmitting it when transmitting the cryptographic key; and a cryptographic key receiving unit. The system is equipped with a determination means for determining whether or not the encryption key data has been received correctly by referring to an error check code, and a warning means for issuing a warning when the determination means determines that there is an error. It is a feature.

[作用コ 上記の構成を有する本発明のファクシミリ装置において
、入力手段によって設定された暗号鍵データは記憶手段
に格納され、格納された暗号鍵データは付加手段によっ
てエラーチェックコードを付加され信号変換手段によっ
て送信される。
[Function] In the facsimile apparatus of the present invention having the above configuration, the encryption key data set by the input means is stored in the storage means, and the stored encryption key data is added with an error check code by the addition means and then sent to the signal conversion means. Sent by.

また、通信回線を介して受信した信号は変換手段によっ
て暗号鍵データに変換された後、正しく受信されていつ
か否かを暗号鍵に付加されたエラーチェックコードによ
って判定手段で判定し、正しければ暗号鍵データを記憶
手段に格納し、誤っていれば警告手段により使用者に対
し警告を与える。
In addition, after the signal received via the communication line is converted into encryption key data by the conversion means, the determination means determines whether it has been correctly received or not based on the error check code added to the encryption key. The key data is stored in the storage means, and if the key data is incorrect, the warning means gives a warning to the user.

[実施例] 以下、本発明を具体化した一実施例を図面を参照して説
明する。
[Example] Hereinafter, an example embodying the present invention will be described with reference to the drawings.

本実施例では、通信信号としてDTMF信号を使用して
いる。DTMF信号とは2つの無変調信号を合成した信
号で、一般には電話のPBダイヤル信号として使われて
いる。第1図は本実施例における通信装置のブロック図
である。第1図において、本装置は暗号化及び解読化の
ための暗号鍵データを格納するメモリ1、暗号鍵データ
を設定するためのキーボード2、通信回線を介して受信
したDTMF信号をデータに変換するDTMF受信機3
、受信したデータを一時的に蓄える受信バッファ5、メ
モリ1に格納されている暗号鍵データをDTMF信号に
変換して通信回線へ送出するDTMF送信機4、送信デ
ータを一時的に蓄える送信バッファ6、受信した暗号鍵
に誤りがあることを判定した際に警告表示をおこなうエ
ラー表示LED7、暗号鍵の送信を開始させるための送
信スイッチ9、暗号鍵の受信を開始させるための受信ス
イッチ10、これらの装置を制御するCPU8を備えて
いる。
In this embodiment, a DTMF signal is used as a communication signal. A DTMF signal is a signal that is a combination of two unmodulated signals, and is generally used as a PB dial signal for telephones. FIG. 1 is a block diagram of a communication device in this embodiment. In FIG. 1, this device includes a memory 1 for storing encryption key data for encryption and decryption, a keyboard 2 for setting encryption key data, and a converter for converting DTMF signals received via a communication line into data. DTMF receiver 3
, a reception buffer 5 that temporarily stores received data, a DTMF transmitter 4 that converts the encryption key data stored in the memory 1 into a DTMF signal and sends it to a communication line, and a transmission buffer 6 that temporarily stores transmission data. , an error display LED 7 that displays a warning when it is determined that there is an error in the received encryption key, a transmission switch 9 for starting the transmission of the encryption key, and a reception switch 10 for starting the reception of the encryption key. It is equipped with a CPU 8 that controls the following devices.

暗号鍵送信時、使用者はキーボード2によって暗号鍵デ
ータを入力し、入力されたデータはCPU8によってメ
モリ1に格納される。暗号鍵送信スイッチ9が押される
と、CPU8はメモリ1に格納されている暗号鍵データ
を取り出して送信バッファ6にセットする。このとき同
時にエラーチェックコードも送信バッファ6にセットす
る。その後、DTMF送信機4によって送信バッファ6
にセットされているデータを順次送信する。
When transmitting the encryption key, the user inputs encryption key data using the keyboard 2, and the input data is stored in the memory 1 by the CPU 8. When the encryption key transmission switch 9 is pressed, the CPU 8 takes out the encryption key data stored in the memory 1 and sets it in the transmission buffer 6. At this time, an error check code is also set in the transmission buffer 6 at the same time. Thereafter, the DTMF transmitter 4 sends the transmit buffer 6
Sequentially transmit the data set in .

暗号鍵受信時、使用者が受信スイッチ10を押すことに
より装置は受信待機状態になる。この状態でDTMF信
号が通信回線から送られてくると、装置はDTMF受信
機3で受信し、受信データは受信バッファ5に蓄えられ
る。受信が終了すると、CPU8は受信バッファ5のデ
ータである暗号鍵とエラーチェックコードを確認する。
When receiving the encryption key, the user presses the reception switch 10, and the device enters a reception standby state. When a DTMF signal is sent from the communication line in this state, the device receives it at the DTMF receiver 3, and the received data is stored in the reception buffer 5. When the reception is completed, the CPU 8 checks the encryption key and error check code, which are the data in the reception buffer 5.

このとき、データが正しく受信されていれば暗号鍵デー
タをメモリ1に格納し、誤っていればエラー表示LED
7を点灯する。
At this time, if the data is received correctly, the encryption key data is stored in memory 1, and if it is received incorrectly, the error display LED is displayed.
Turn on 7.

第2図は、暗号鍵とエラーチェックコードを通信するた
めのデータフレームフォーマットを示す図である。
FIG. 2 is a diagram showing a data frame format for communicating an encryption key and an error check code.

本実施例では、暗号鍵20をD8〜D1の8バイトとし
、この暗号鍵データの総和をエラーチェックコード21
とし、C2,C1の2バイトのデータとする。よって、
データフレームは10バイトで構成される。
In this embodiment, the encryption key 20 is 8 bytes D8 to D1, and the total sum of this encryption key data is the error check code 21.
Let it be 2-byte data of C2 and C1. Therefore,
A data frame consists of 10 bytes.

第3図は、本実施例における暗号鍵送信時の送信手順を
示すフローチャートである。第3図ステップS30にお
いて、第2図20における暗号鍵の8バイトのデータD
8〜D1の値の総和を計算し、続くS31で第2図21
におけるエラーチェックコードとして送信バッファに暗
号鍵と一緒に設定する。第3図832で送信を開始する
。なお、本実施例では、送信するデータの順序は、暗号
鍵D8を先頭としD7、D6、・・・・Dlまでを送信
した後、エラーチェックコードを02、C1の順に送信
するものとする。(第3図333.5第4図は、本実施
例における暗号鍵受信時の受信手順を示すフローチャー
トである。第4図841において、第2図の暗号鍵デー
タフレームの受信を開始する。
FIG. 3 is a flowchart showing a transmission procedure when transmitting an encryption key in this embodiment. In step S30 of FIG. 3, the 8-byte data D of the encryption key in FIG.
The sum of the values 8 to D1 is calculated, and in the subsequent S31, the process shown in FIG.
Set it together with the encryption key in the transmission buffer as an error check code. Transmission begins at 832 in FIG. In this embodiment, it is assumed that the order of the data to be transmitted is such that the encryption key D8 is at the beginning, D7, D6, . . . Dl are transmitted, and then the error check code is transmitted in the order of 02 and C1. (FIG. 333.5 FIG. 4 is a flowchart showing the reception procedure when receiving an encryption key in this embodiment. At 841 in FIG. 4, reception of the encryption key data frame of FIG. 2 is started.

S42において全データフレーム10バイトの受信を終
了した後、S43でフレームデータの先頭から8バイト
D8〜D1までの総和をとり、S44で前記総和値と残
り2バイトのデータと比較する。この値が等しければ受
信が正常に行われたものとして、第1図メモリ3に格納
する。一方、S44で誤りがあればデータフレームが破
壊されたと判断し、第1図エラー表示LED7のエラー
表示する。尚、本実施例においては警告手段としてLE
Dなどの表示手段を行っているが、別の方法としてブザ
ー音およびプリント出力などの方法でもよい。エラー表
示LED7が点灯すると、暗号鍵受信側は、送信側に対
して再度暗号鍵の送信を依頼する。 再送信の依頼方法
としては、口頭によるもののほかに自動的に行う方法が
ある。これは、受信した暗号鍵が第4図844で誤りと
判断された場合、自動的に暗号鍵送信側に対し暗号鍵再
送信要求信号を送信し、暗号鍵送信側はその信号を受は
取った場合、再度同じ暗号鍵データを送信するものであ
る。
After receiving all 10 bytes of the data frame in S42, the sum of the first 8 bytes D8 to D1 of the frame data is calculated in S43, and the sum value is compared with the remaining 2 bytes of data in S44. If these values are equal, it is assumed that the reception was performed normally and the data is stored in the memory 3 in FIG. On the other hand, if there is an error in S44, it is determined that the data frame has been destroyed, and an error is displayed on the error display LED 7 in FIG. In this embodiment, LE is used as a warning means.
Although display means such as D are used, other methods such as a buzzer sound and printout may also be used. When the error display LED 7 lights up, the encryption key receiving side requests the sending side to send the encryption key again. Methods for requesting retransmission include a verbal method and an automatic method. This means that if the received encryption key is determined to be incorrect at 844 in FIG. In this case, the same encryption key data will be sent again.

第4図344で正常と判断されれば、暗号鍵の送信側と
受信側は等しい暗号鍵データが設定されたことになる。
If it is determined to be normal at 344 in FIG. 4, it means that the same encryption key data has been set on the sending and receiving sides of the encryption key.

その後、送信側、受信側双方が暗号通信モードによるフ
ァクシミリ通信を行えば、画信号送信側は第1図メモリ
3に格納された暗号鍵で画信号を暗号化して送信し、画
信号受信側は第1図メモリ3に格納された暗号鍵で受信
信号を解読化して画信号を得る。
After that, when both the sending side and the receiving side perform facsimile communication in encrypted communication mode, the image signal sending side encrypts the image signal with the encryption key stored in the memory 3 in FIG. 1 and transmits it, and the image signal receiving side The received signal is decrypted using the encryption key stored in the memory 3 in FIG. 1 to obtain an image signal.

[発明の効果コ 以上詳述したことから明らかなように本発明によれば、
暗号鍵の受信時、通信回線のノイズ等により暗号鍵か破
壊されてしまった場合、誤った暗号鍵が設定されてしま
うことを防止し、暗号通信が正しく行えるものである。
[Effects of the Invention] As is clear from the above detailed description, according to the present invention,
When receiving an encryption key, if the encryption key is destroyed due to noise on the communication line, it is possible to prevent an incorrect encryption key from being set, and to perform encrypted communication correctly.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図から第4図までは本発明を具体化した実施例を示
すもので、第1図は本実施例の構成を示すブロック図で
あり、第2図は本実施例における暗号鍵の通信データフ
レームフォーマットを示す図であり、第3図は本実施例
における暗号鍵送信時のデータ送信手順フローチャート
であり、第4図は本実施例における暗号鍵受信時のデー
タ受信手順フローチャートである。 1:メモリ      2:キーボード3 : DTM
F受信機  4 : DTMF送信機7:エラー表示L
ED  8:CPU
1 to 4 show embodiments embodying the present invention, FIG. 1 is a block diagram showing the configuration of this embodiment, and FIG. 2 is a communication of encryption keys in this embodiment. 3 is a diagram showing a data frame format; FIG. 3 is a flowchart of a data transmission procedure when transmitting an encryption key in this embodiment; and FIG. 4 is a flowchart of a data reception procedure when receiving an encryption key in this embodiment. 1: Memory 2: Keyboard 3: DTM
F receiver 4: DTMF transmitter 7: error display L
ED 8: CPU

Claims (1)

【特許請求の範囲】[Claims] 暗号化及び解読化のための暗号鍵データを設定するため
の入力手段と、入力手段により設定された暗号鍵データ
を格納する記憶手段と、記憶手段に格納されている暗号
鍵データを通信信号に変換して通信回線へ送出する送信
信号変換手段と、前記記憶手段に格納された暗号鍵によ
って送信画像を暗号化し送信する暗号変換手段と、通信
回線を介して受信した通信信号を暗号鍵データに変換す
る受信信号変換手段と、受信信号変換手段によって変換
された暗号鍵データを前記記憶手段に格納させる格納手
段と、受信した暗号化信号を前記記憶手段に格納された
暗号鍵によって解読化して画信号を得る暗号解読手段を
備えたファクシミリ装置において、暗号鍵送信時に暗号
鍵データにエラーチェックコードを付加して送出する付
加手段と、暗号鍵受信時に暗号鍵データを正しく受信し
たか否かをエラーチェックコードを参照することにより
判定する判定手段と、その判定手段により誤りがあるこ
とを判定した際に警告をおこなう警告手段を備えたファ
クシミリ装置。
An input means for setting encryption key data for encryption and decryption, a storage means for storing the encryption key data set by the input means, and an input means for converting the encryption key data stored in the storage means into a communication signal. a transmission signal conversion means for converting the transmitted image and sending it to the communication line; a cryptographic conversion means for encrypting and transmitting the transmission image using the encryption key stored in the storage means; a received signal converting means for converting the received signal; a storing means for storing the encryption key data converted by the received signal converting means in the storage means; A facsimile machine equipped with a decryption means for obtaining a signal includes an additional means for adding an error check code to the encryption key data when transmitting the encryption key and transmitting it, and an additional means for adding an error check code to the encryption key data when transmitting the encryption key, and an error check code for determining whether or not the encryption key data has been correctly received when receiving the encryption key. A facsimile machine comprising a determining means that makes a determination by referring to a check code, and a warning means that issues a warning when the determining means determines that there is an error.
JP2323559A 1990-11-26 1990-11-26 Facsimile equipment provided with cryptographic function Pending JPH04196683A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2323559A JPH04196683A (en) 1990-11-26 1990-11-26 Facsimile equipment provided with cryptographic function
US07/783,885 US5202920A (en) 1990-11-26 1991-10-29 Facsimile equipment having a secure communication function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2323559A JPH04196683A (en) 1990-11-26 1990-11-26 Facsimile equipment provided with cryptographic function

Publications (1)

Publication Number Publication Date
JPH04196683A true JPH04196683A (en) 1992-07-16

Family

ID=18156048

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2323559A Pending JPH04196683A (en) 1990-11-26 1990-11-26 Facsimile equipment provided with cryptographic function

Country Status (2)

Country Link
US (1) US5202920A (en)
JP (1) JPH04196683A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0964803A (en) * 1995-08-21 1997-03-07 Nippon Denki Ido Tsushin Kk Portable telephone system
US7995760B2 (en) 2001-06-08 2011-08-09 Nokia Corporation Method for ensuring data transmission security, communication system and communication device

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6058187A (en) * 1997-04-17 2000-05-02 At&T Corp. Secure telecommunications data transmission
JP2001202297A (en) * 2000-01-19 2001-07-27 Sharp Corp Facsimile equipment, information processor and data communication method
US7151834B1 (en) * 2000-08-03 2006-12-19 Agere Systems Inc. Methods and devices for controlling facsimile transmissions of confidential information
US8732566B2 (en) * 2006-11-29 2014-05-20 Omtool, Ltd. Methods and apparatus for digital content handling
US8904270B2 (en) * 2006-11-29 2014-12-02 Omtool Ltd. Methods and apparatus for enterprise document distribution
US20040158733A1 (en) * 2003-02-11 2004-08-12 Thaddeus Bouchard Method and system for secure facsimile delivery and registration
JP2005071175A (en) * 2003-08-26 2005-03-17 Ricoh Co Ltd Print data generation method, program for executing its method on computer, client terminal, printer server, print data generation device, and image forming apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2448825A1 (en) * 1979-02-06 1980-09-05 Telediffusion Fse SYSTEM FOR TRANSMITTING INFORMATION BETWEEN A TRANSMISSION CENTER AND RECEIVING STATIONS, WHICH IS PROVIDED WITH A MEANS OF CONTROLLING ACCESS TO THE INFORMATION TRANSMITTED
US4956863A (en) * 1989-04-17 1990-09-11 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0964803A (en) * 1995-08-21 1997-03-07 Nippon Denki Ido Tsushin Kk Portable telephone system
US7995760B2 (en) 2001-06-08 2011-08-09 Nokia Corporation Method for ensuring data transmission security, communication system and communication device

Also Published As

Publication number Publication date
US5202920A (en) 1993-04-13

Similar Documents

Publication Publication Date Title
US6584563B1 (en) User support system for cryptographic communication in network systems
JPH04196683A (en) Facsimile equipment provided with cryptographic function
JPH09275397A (en) Ciphered communication equipment
JPS586338B2 (en) Kimitsutsu Shinboshiki
JPH1168735A (en) Protecting method for communication data, transmitter and receiver
JP3161223B2 (en) Facsimile machine
JP2628558B2 (en) Facsimile machine
JP3274765B2 (en) Facsimile machine
JP3143607B2 (en) Data communication method
JPS6115429A (en) Radio selective call communication system
JPS63119365A (en) Data communication equipment
JPS63211860A (en) Facsimile equipment
JPS60130969A (en) Facsimile device
JPS6229363A (en) Facsimile equipment
JPH11252384A (en) Facsimile equipment
JPH0216865A (en) Remote party confirming system for facsimile communication
JPS6031363A (en) Facsimile equipment
JPH0294773A (en) Ocr facsimile equipment
JPS62269474A (en) Facsimile equipment
JPH01228257A (en) Giii facsimile equipment
JPH07203052A (en) Remote control device
JPH10224641A (en) Facsimile equipment having secret reception function
JPH04142868A (en) Facsimile equipment
JPH1013583A (en) Facsimile equipment
JPH06178004A (en) Communication terminal equipment